Eric Mertens
b2fa28dd95
Apply cmode C to replies ( #328 )
2022-04-14 13:14:12 -07:00
Ed Kellett
ba95896969
Make valid_temp_time overflow-resistant
2022-04-13 01:09:27 +01:00
Ed Kellett
1fcdacb424
Test some edge cases of valid_temp_time
2022-04-13 01:09:27 +01:00
Stephen Bennett
2f596395fa
Make opers talking through +g controllable by user mode +M ( #275 )
...
Times out after 30 minutes, and adds oper:always_message privilege for
bots and services to always talk through +g
2022-04-12 17:54:58 -04:00
Jess Porter
099d470763
show IPs in remote /stats i ( #312 )
...
Co-authored-by: Eric Mertens <emertens@galois.com>
2022-04-08 10:06:43 -07:00
Aaron Jones
80d71456cf
authd/providers/opm.c: include <netinet/tcp.h> ( #318 )
...
This header defines the TCP_NODELAY flag, which this compilation
unit uses.
Other C libraries implicitly include this header from some other
header we are using (I have not investigated which), but musl's
system headers do not, which breaks building on musl.
Reported-by: 0x5c <dev@0x5c.io>
2022-04-08 09:47:18 -07:00
David Schultz
9dd98618d0
whowas.c: store account name in whowas ( #323 )
...
Co-authored-by: Eric Mertens <emertens@galois.com>
2022-04-01 14:58:43 -07:00
Ed Kellett
c2fdb023a9
Remove the subset ban restriction
...
I think this was always pretty questionable. You can set redundant bans
in various ways anyway, and preventing all of them would only make the
situation worse, as wide temporary bans would destroy narrow permanent
ones, for example.
2022-04-01 22:49:54 +01:00
Ed Kellett
492d560ee1
valid_temp_time: style fixes
2022-03-06 22:51:19 +00:00
Ed Kellett
2644dcd166
Add tests for valid_temp_time
2022-03-06 22:51:19 +00:00
Ed Kellett
7a246575e5
remove some header dependencies on client.h
2022-03-06 22:51:19 +00:00
David Schultz
93035e75d9
Support more human friendly k/d/x-line duration format
2022-03-06 22:51:19 +00:00
Eric Mertens
22ebfd257e
Fix comment in example configuration
2022-02-03 09:23:42 -08:00
Valentin Lorentz
18ac52f017
Remove ambiguity in descriptions +u
...
The old descriptions might be interpreted as meaning that +u enables
server-side filtering.
2022-01-31 00:02:07 +00:00
Jess Porter
042218080e
don't subject remote users to chm_nonotice
2022-01-16 18:06:53 +00:00
Ed Kellett
5a1b54fddc
channel: always send chm_hidden modes to servers
2021-12-04 20:27:59 +00:00
Aaron Jones
284649441f
ircd/packet.c: make function definition consistent with declaration ( #301 )
...
This function has a static forward-declaration, and is not used outside
this compilation unit. However, the definition was non-static. Fix this.
2021-11-30 11:50:30 -08:00
jess
bd38559fed
better standardised SNO_FULL. always show host AND ip
2021-11-14 17:59:58 +00:00
Ed Kellett
19f0ae8429
check_one_kline: fix kline_spoof_ip handling
2021-11-07 23:30:22 +00:00
Eric Mertens
85d5888f69
Fix link to doc/readme.txt
2021-11-02 08:52:41 -07:00
Valerie Pond
08b7b6bd7e
just a stray colon where it wasn't meant to have :)
2021-10-26 20:32:15 -05:00
Ed Kellett
b5bf350512
m_list: fail on invalid parameters
...
Loose port of 6ea60b2297948211925e22bd1f284179d680b4ae. I've chosen to
reduce indentation where it's convenient, and I'm allowing >-[0-9] as a
way of specifying a minimum of 0 because... I don't know, it just seems
neater to me.
2021-10-20 11:35:53 +01:00
Ed Kellett
e7f0aea682
m_list: Treat valid names with wildcards as masks
...
* and ? are valid characters for channel names on IRC, and ELIST M gives
no way to distinguish between `LIST #foo-*` that's meant to search for
channels beginning `#foo-` and `LIST #foo-*` that's meant to list one
channel named literally `#foo-*`.
In order to deal with this, we will always assume a name with wildcards
is a mask. If it's also a channel name, that will be listed first.
2021-10-19 23:33:48 +01:00
Ed Kellett
cbb9d48fa2
Add mask modifiers to LIST help
2021-10-19 23:33:48 +01:00
Ed Kellett
1788e55713
Support *mask* and !*mask* in LIST
2021-10-19 23:33:48 +01:00
Doug Freed
08e57732b6
CREDITS: add mcintosh
2021-10-18 19:33:18 -04:00
Ed Kellett
31db8f0094
m_names: use ITER_COMM_CHANNELS
2021-10-17 17:36:53 +01:00
Ed Kellett
54f05581ab
helpops: show opernames to opers
2021-10-17 01:56:49 +01:00
jess
430833dca2
"KLINE active for ..." -> "Disconnecting K-Lined user ..."
2021-10-09 23:44:36 +01:00
jess
78825899cd
explicitly show IP in SNO_BANNED snotes
2021-10-09 22:45:22 +01:00
Seth Arnold
e7ab04fc74
add sqlite3 to build instructions
...
Quite often people new to Solanum run into trouble in the configure step: the error message if they are lacking either the pkg-config or libsqlite3 packages are identical and discovering the pkg-config dependency is not trivial:
checking for SQLITE... no
configure: error: sqlite3 is required
I can't promise this apt install line is complete, but I know that I've suggested the pkg-config and libsqlite3-dev packages many times in the #solanum channel and they've been very helpful.
2021-10-09 15:09:12 +01:00
David Schultz
c57762ed50
doc/features/extban.txt: document $j, $x, and $z
2021-10-02 17:20:38 +01:00
Eric Mertens
1d107bae93
Add 3 more of the delegates to CREDITS
2021-09-24 19:21:02 -07:00
Ryan Schmidt
cb317c5e4a
Send RPL_ENDOFTRACE on local /etrace
2021-09-23 20:49:30 +01:00
Ed Kellett
7b4a1198c5
extb_canjoin: Ignore exemptions
2021-09-22 15:28:36 +01:00
David Schultz
202674a822
fix typo in sasl_only_client_message
( #279 )
2021-09-15 11:57:48 -07:00
Eric Mertens
981a94c3c9
chm_regmsg: actually check channel mode ( #271 )
2021-08-23 19:52:18 -07:00
Eric Mertens
2ef034d111
Avoid show_iline_prefix showing leftovers ( #266 )
2021-08-21 08:54:16 -07:00
Aaron Jones
e9e4192e10
Remove sno_whois from reference.conf ( #270 )
...
This was missed in commit 26c3681f7c
2021-08-21 11:33:48 +00:00
jesopo
a8457d98e5
switch sasl_usercloak.c to use SNO_BANNED
2021-08-20 18:38:05 +01:00
Eric Mertens
82436efb60
hook_fn casts were hiding UB ( #265 )
2021-08-19 20:09:40 -07:00
Ed Kellett
b6b40dda24
Make new_local_user hooks handle dead clients
2021-08-19 20:58:36 +01:00
Eric Mertens
e83449d5be
Stop announcing SASL cap changes on services split/join ( #263 )
2021-08-15 16:25:46 -07:00
jesopo
540c3a8a05
ERR_USERONCHANNEL when following a forward is missing a param
2021-08-15 05:15:27 +01:00
Aaron Jones
95898abbb1
ircd/newconf: ignore invalid connect block passwords ( #261 )
...
Also, ignore a connect block that requests certfp authentication
without setting the ssl flag, as it will then go on to fail anyway.
Finally, correct an erroneous error message about class blocks.
2021-08-14 23:14:39 +00:00
owen
f6b73103d6
add SNO_FARCONNECT to the help text ( #260 )
...
* add SNO_FARCONNECT to the helptext
2021-08-14 11:15:39 +00:00
jesopo
be52c4c062
add SNO_BANNED, snote for it on client k/x-line rejection ( #242 )
...
* add SNO_BANNED, snote for it on client k/x-line rejection
* add snomask help file line for SNO_BANNED
2021-08-11 17:08:31 +01:00
jesopo
0fd3040caf
add show_iline_prefix for IsNeedSasl
2021-08-04 11:33:04 -04:00
Valentin Lorentz
667c106118
Rename doc/index.txt to doc/readme.txt and mention reference.conf
...
The new name will make it appear in GitHub's web view.
2021-07-31 00:48:23 -04:00
Valentin Lorentz
6e2baa6661
reference.conf: Document the common syntax for flags
...
It was only documented as an example in the auth {} block,
not for other blocks.
2021-07-31 00:45:04 -04:00